General

  • Target

    fd9d501b3670ab505b96dba9608fcb680a3bf964542839c1951e2cfd3c59a1cb

  • Size

    188KB

  • Sample

    210224-hp9r3zvena

  • MD5

    2cfde42e2e6b9126ca0f1026d3f6f532

  • SHA1

    57a0e6c682a80480170b65f1562f5fc45626ae77

  • SHA256

    fd9d501b3670ab505b96dba9608fcb680a3bf964542839c1951e2cfd3c59a1cb

  • SHA512

    19b562b4b22ab953c6d796a766e4d25816a3a79b72bb246464af8f5aea138a566f33d72e37e40f4d26bd7e2e0301205915bb4fa24b0ba39b640c3ab6b9eaf995

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      fd9d501b3670ab505b96dba9608fcb680a3bf964542839c1951e2cfd3c59a1cb

    • Size

      188KB

    • MD5

      2cfde42e2e6b9126ca0f1026d3f6f532

    • SHA1

      57a0e6c682a80480170b65f1562f5fc45626ae77

    • SHA256

      fd9d501b3670ab505b96dba9608fcb680a3bf964542839c1951e2cfd3c59a1cb

    • SHA512

      19b562b4b22ab953c6d796a766e4d25816a3a79b72bb246464af8f5aea138a566f33d72e37e40f4d26bd7e2e0301205915bb4fa24b0ba39b640c3ab6b9eaf995

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks